Skip to search formSkip to main contentSkip to account menu

Phishing

Known as: Phishers, Phishing scam, Phising 
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Data Clustering or unsupervised classification is one of the main research area in Data Mining. Partitioning Clustering involves… 
2009
2009
Session Initial Protocol (SIP) is widely used for handling multimedia signaling. Because SIP is widely used in many multimedia… 
2007
2007
Most organisations realise the importance of computer security, yet many struggle with how to teach and influence their users to… 
Highly Cited
2006
Highly Cited
2006
The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email messages and web sites designed to… 
Review
2004
Review
2004
We provide a survey on security features and threats to exist ing Instant Messaging (IM) networks and discuss how currently…